Method Ontology for Intelligent Network Forensics Analysis

Size: px
Start display at page:

Download "Method Ontology for Intelligent Network Forensics Analysis"

Transcription

1 2010 Eighth Annual International Conference on Privacy, Security and Trust Method Ontology for Intelligent Network Forensics Analysis Sherif Saad Electrical and Computer Engineering University Of Victoria Issa Traore Electrical and Computer Engineering University Of Victoria Abstract Network forensics is an after the fact process to investigate malicious activities conducted over computer networks by gathering useful intelligence. Recently, several machine learning techniques have been proposed to automate and develop intelligent network forensics systems. An intelligent network forensics system that reconstructs intrusion scenarios and makes attack attributions requires knowledge about intrusions signatures, evidences, impacts, and objectives. In addition, problem solving knowledge that describes how the system can use domain knowledge to analyze malicious activities is essential for the design of intelligent network forensics systems. In this paper we adapt recent researches in semantic-web, information architecture, and ontology engineering to design a method ontology for network forensics analysis. The proposed ontology represents both network forensics domain knowledge and problem solving knowledge. It can be used as a knowledge-base for developing sophisticated intelligent network forensics systems to support complex chain of reasoning. We use a real life network intrusion scenario to show how our ontology can be integrated and used in intelligent network forensics systems. I. INTRODUCTION Network forensics analysis is the process of extracting intrusion patterns and investigating malicious activities conducted over the network. Although there are many tools that can be used to collect and preprocess raw network forensics data, the important task of verifying the existence of malicious activities, describing their details, and identifying their sources is currently largely an ad-hoc and manual process. Considering the massive amount of data to analyze and the different data sources to cover, we can easily understand that network forensics analysis is a complex and time consuming task. In this context, the automation of the network forensics analysis becomes a necessity. Automating the network forensics process raises some key challenges as this requires converting the existing ad-hoc approaches into systematic analysis techniques and converting existing expert knowledge into intelligent analysis and decision-making mechanisms. Existing network forensics analysis systems usually focus on the statistical features characterizing the malicious activities. However, in real-life practice, forensics analysts focus primarily on the meaning or semantics of the malicious activities and pay little attention to statistical characteristics. For that reason intelligent network forensics systems should extract and analyze as well the semantics of the malicious activities. The use of semantics analysis in intelligent network forensics investigation requires the existence of an ontology that provides a formal representation of the set of concepts characterizing forensics entities and processes and the relations between these concepts. Ontologies play a major role in building knowledge representation systems and Artificial Intelligence (AI) systems in general. In fact, ontologies are the core of any knowledge representation system, because at minimum they provide the conceptualization of the vocabularies within a specific domain. Of course, without a strong conceptualization we end up with a weak knowledge-base that cannot distinguish between concepts within the domain. In this case, reasoning about the domain will be difficult and perhaps useless. Ontologies allow clarifying the structure of knowledge and concepts in the domain which improve reasoning systems. Today, most of the proposed security or network forensics ontologies are domain ontologies that are used to provide common vocabularies and make knowledge sharable by encoding domain knowledge. These domain ontologies are less valuable for developing intelligent systems such as expert and reasoning systems. This is because of their lack of problem solving mechanisms that allow an intelligent system to use domain knowledge to solve a specific problem. Method ontology refers to a category of ontologies that contain knowledge about how to achieve a particular task. In this work we propose a method ontology for network forensics analysis, which to our knowledge is the first of the kind. The proposed ontology represents both network forensics domain knowledge and problem solving knowledge. The current version of our network forensics ontology contains knowledge about more than 11,000 malicious activities and 30 network forensics problem solving methods. Ontologies are commonly categorized into lightweight and heavyweight ontologies. This categorization is based on the formality and the granularity of the knowledge represented by the ontology. Intelligent systems such as expert and reasoning systems require heavyweight ontologies. Our proposed network forensics ontology is a heavyweight ontology. The rest of the paper is structured as follows. Section II summarizes and discusses related work. Section III describes the main phases of the proposed ontology development lifecycle. Section IV presents the basic building blocks of the proposed network forensics ontology. Section V presents and /10/$ IEEE 7

2 discusses the reasoning capabilities of the proposed ontology. Section VI illustrates the application of the proposed ontology through the case study of a real-life network intrusion scenario. Section VII makes some concluding remarks and discusses future research. II. RELATED WORK To our knowledge, few network forensics ontologies have been proposed in the literature and none of these ontologies provide specific mechanisms for building intelligent network forensics system. Brinson and colleagues[1] define an ontology that describes characteristics and concepts pertaining to the cyber forensics profession, and what the people involved in cyber-forensics environment need to do in terms of education, certification and specialization. Although the proposed ontology sheds some light on the different job functions underlying the cyber forensics profession and may assist in curriculum development, it does little to advance cyber forensics methodologies and techniques. Park and colleagues [2] propose a cyber forensics ontology for criminal investigation in cyber space. The proposed ontology emphasizes on the definitions of the different types of cyber crimes such as cyber terrorism, general cyber crimes, hacking, fraud, etc. In addition to defining cyber crimes, the ontology focuses on defining the types of evidences that can be collected to prove criminal intention for each type of cyber crime. The authors also discuss the possibility of using ontology in mining cyber crimes data, but the proposed ontology fails to provide the required knowledge to accomplish such objective. Hoss and Carver suggest the use of ontology in network forensics analysis, although no specific ontology is proposed in their paper [3]. Only an abstract structure for the required ontologies and their characteristics are provided. Specifically, a framework identifying five specialized ontologies is proposed. These include Crime Ontology, Forensics Device Ontology, Legal Ontology, Digital Device Ontology and Ontology for Forensics Information Integration. While limited work has been done on the use of ontology in network forensics, in recent years several ontologies have been proposed for intrusion detection systems. We review in the rest of this section sample of these works, since intrusion detection is the most related area to network forensics. Undercoffer and colleagues [4] propose the first ontology for intrusion detection system. The authors introduce a target centric ontology for intrusion detection by analyzing intrusion alerts. The proposed ontology is built by evaluating 4000 vulnerabilities and the required attack strategies to exploit these vulnerabilities. Principal component analysis and fuzzy clustering are used for feature extraction and data abstraction, while Mahalanobis distance is used for dissimilarity measurement. According to the authors, the proposed ontology can also be used to detect distributed attacks. Hung and Liu [5], [6] develop an anomaly intrusion detection system using a network attack ontology based on the ontology developed by Undercoffer et al. [4]. The proposed anomaly IDS consists of three stages, namely, specification, mapping, and generation. The proposed approach is compared experimentally against traditional anomaly intrusion detection approaches based on algorithms such as K-means, Nearest Cluster Algorithm (NEA), and C4.5. It is reported that the ontology-based approach achieves better performance results compared to the traditional ones. Abdoli and Kahani develop ontology for distributed intrusion detection system [7] using Protege editor. They use ontology to provide a mean of extracting semantic relations between attacks and intrusions alerts generated by different IDSs. The proposed intrusion detection system uses the ontology approach to reduce the false alarm rate in the network. Isaza and colleagues use ontology to develop an intelligent intrusion detection system [8], [9]. The authors use artificial neural network and multi-agent system (MAS) to build an intelligent distributed intrusion detection system. The ontology proposed in this work captures the knowledge related to intrusion signatures, reaction, and prevention rules. According to the authors, the detection accuracy of the proposed ontologybased IDS is superior to that obtained for traditional signaturebased IDS. III. ONTOLOGY DEVELOPMENT LIFECYCLE There are many methods to build an ontology that represents a domain of knowledge and supports reasoning over such knowledge. To build our network forensics ontology we use a hyper approach that combines different key features from several ontology development approaches, such as the METHONTOLOGY approach which is based on the work of Lopez and Perez [10]. Most of the ontologies developed today are based on this approach. METHONTOLOGY divides the ontology developing process into eleven main tasks. In addition, the process itself is based on evolving prototypes. While we use METHONTOLOGY as our main ontology development approach we also select some key feature from other approaches mainly the Uschold and King [11] approach and the work of Gruninger and Fox [12]. We discuss in this section the key steps involved in our network forensics ontology development. A. Specification Based on METHONTOLOGY approach we begin by creating a specification for our network forensics ontology. According to our specification, our ontology is a heavyweight ontology in terms of formality and granularity and its domain of interest is network forensics. We choose description logic as our ontology knowledge representation paradigm allowing us to formalize the knowledge in our ontology. Our network forensics ontology is a method ontology that represents knowledge about the network forensics domain including concepts and their relations and attributes and facts about these concepts. In addition, as method ontology, it contains knowledge about how to use the domain knowledge for problem solving or complex chain of reasoning. In other words our ontology 8

3 contains knowledge that represent the network forensics domain and the network forensics investigation process. B. Conceptualization After setting our ontology specification, we move to the conceptualization stage. In this stage we identify the basic concepts or classes that are domain specific or network forensics specific. We identify three main types of knowledge to be represented in our network forensics ontology. These three types of knowledge are: Problem solving goals. Problem solving knowledge for network forensics process Factual knowledge about network forensics domain The problem solving goals are a set of network forensics process goals. These goals are expressed in a set of informal competency questions. For instance, a network forensics competency question could be something like: Given a set of intrusion alerts, what are the attacks types that appear in this set? In our initial prototype we defined 71 competency questions a sample of which are listed here: What vulnerabilities exist in the target system? What are the critical attack assets? Given a set of privileges, what is the attacker capable of? Given a set of attack impacts, what are the attacks that result in these impacts? Given a set of assets, which assets are vulnerable assets? As shown in Figure 1, the competency questions are structured in hierarchical tree structure or taxonomic structure, such that the answer of any parent competency question requires the answers from all its children competency questions. Fig. 1. Example of Competency Questions Tree Structure The competency questions are used during the design of the ontology to help us in identifying the problem solving goals for our ontology. The competency questions and their answers are useful to acquire knowledge about the scope of the problem submitted to the ontology, as well as the necessary constraints, assumptions, input and output data. In addition, we use these competency questions to evaluate our ontology, by ensuring that the implemented ontology is able to answer all the competency questions identified during the ontology design stage. Another important knowledge that must be represented by our ontology is the problem solving knowledge for network forensics process. This knowledge is represented by the set of constraints, roles, and property functions that process the knowledge to achieve the goals of the forensics analysis. As an example let s go back to our first competency question: Given a set of intrusion alerts, what are the attacks types that appear in this set?. According to this question we have a diagnostic goal with respect to the problem which is in this case the attacks types (classes). The ontology must contain knowledge describing the diagnostic goal. This knowledge is represented in the ontology as a set of constraints and functions. The problem solving knowledge explains how the domain knowledge can be used to reach the problem solving goals. The third type of knowledge that we represent in the network forensics ontology is factual knowledge or domain knowledge. Such knowledge include classes, sub-classes, properties, and relations between classes. We need to represent all the abstract and core concepts that exist in the network forensics domain. Classes that share the core concepts, such as the class computer-virus and the class computer-worm, are connected by taxonomic relations. Classes from different taxonomies are also connected, for instance, the class webserver and the class denial-of-services both are connected by a non-taxonomic relation. The next step after identifying the goals of our network forensics ontology is to determine the concepts and the classes that are specific to the network forensics domain. There are three main methods in ontology engineering to construct domain classes, namely Top-Down, Middle-Out, and Bottom-Up approaches [11]. We choose the middle-out method because experience with ontology design shows that middle-out is the most effective method. The middle-out method is very simple to apply. It begins by the identification of the most important concepts or classes that exist in the domain, followed by the more abstract and more specific classes. For instance, the class alert is a middle class in the evidence class taxonomy, while the class evidence is more abstract and the class intrusion alert is more specific. To cover a wide range of classes in the network forensics domain we studied several network intrusion taxonomies and ontologies [13], [14], [4], [15]. Now we have to build the classes taxonomies to group our ontology classes into categories. At this point we use the class description and properties to group similar classes in a single taxonomy. Note that classes in a single taxonomy are connected with taxonomic relations of type is-a, superclass- Of, and subclass-of. At the end of this step we obtain 12 independent taxonomies, each containing a set of network forensics related classes. Then we build our ontologicalrelations which are the relations that link classes from different taxonomies together. These ontological-relations are divided into general relations and specific relations. Examples of general ontological-relations are part-of, has-a, use-a, etc. General ontological-relations are strictly 2-ary relations (binary relations). On the other hand specific ontological relations are N-ary relations (an N-ary relation maps between a subject and two or more subject/values). Binary relation is the most common type of relation in ontology. However, heavyweight ontologies, method and task ontologies that are used to represent complex knowledge for sophisticated processes require the use of N-ary relations. 9

4 For instance, the representation of the following knowledge: Apache web server is target of denial of service attack with higher severity requires the use of N-ary relations and cannot be represented by two binary relations because the relations in this case are all interconnected. After obtaining the classes and the relations between them, the final step in the conceptualization is to provide, for each class and relation in the ontology, a detailed description informally using natural language. C. Formalization and Implementation We start formalizing the network forensics ontology using the appropriate ontology language. The final step in our ontology lifecycle is the actual implementation of the ontology and feeding the ontology with individuals (classes instances). There are different description logic languages that can be used to implement our network forensics ontology. As mentioned before, we use description logic as our ontology knowledge representation paradigm. We use in this work the Web Ontology Language (OWL) as our ontology encoding language. OWL is a description logic based language to develop ontologies and represent knowledge in semantic web. IV. PROPOSED ONTOLOGY The initial prototype of our ontology contains 111 classes that represent the network forensics domain. Here, we represent the top-level classes in our ontology and the relations between them. These classes represent the main concepts in the network forensics domain. The top-level classes in our network forensics ontology are listed below: Attack Malicious Evidence Impact Attacker Objective Motive Asset Vulnerability System Privilege Location There are two main types of relations in our network forensics ontology, namely, taxonomic relations and ontological relations. The taxonomic relations in our ontology are listed in Table I. The taxonomic relations are binary relations (2-ary relations) used to categorize classes in the network forensics domain in a taxonomic structure. From Table I we can see that we use in our network forensics ontology four taxonomic relations. All of these relations are transitive, reflexive, and anti-symmetric. The first relation is-a is used to identify the type of a property. For instance, the class attack has the property tool, where tool is-a Malicious. The superclass-of and subclass-of relations are used to express inheritance. For instance, the class location is the superclass-of remote-location and locallocation and so both remote-location and local-location are subclass-of location. Finally, the instance-of relation is used to link an individual to a specific class. For instance, the code-red is instance-of computer-worm. The second type of relations in our ontology, as mentioned before, is the ontological relations. These relations are either binary or N-ary relations (ternary or more). As indicated before, there are general ontological relations and specific ontological relations. Specific ontological relations represent more complex relations than the general ones. Our general ontological relations are listed in Table II. Relation-Name Subject-Class Object-Class Executes Attacker Attack Exploits Attacker Vulnerability Uses Attacker Malicious Located-At Attacker Location Has-A Attacker Motive Leaves Attacker Evidence Uses Attacker Malicious Target Attacker Asset Gains Attacker Privilege Compromises Attacker System Requires Attack Vulnerability Elevates Attack Privilege Proved-By Attack Evidence Causes Attack Impact Triggered-By Attack Malicious Affects Attack Asset Traced-To Attack Malicious Has-A Attack Objective Exist-In Vulnerability Asset Requires Attack Privileges Extracted-From Evidence Asset TABLE II GENERAL ONTOLOGICAL RELATIONS In the initial prototype of our ontology, four specific ontological relations are defined. These relations are N-ary relations represented by two major patterns. The first pattern isbycreatinganewclasswith N propertiestorepresentthenary relation. The second pattern is by using lists for arguments to identify a N-ary relation that represents a sequence of arguments. The first N-ary relation in our ontology is attack diagnosis relation. This N-ary relation describes the relation between asset, attack, attack confidence, and attack severity. We create a new class in our ontology to represent this relation as depicted in Figure 2. Fig. 2. Attack Diagnosis Relation The second N-ary relation is attack attribution that shows the attribution of an attack incident. We use the first N-ary relation design pattern to represent the attack attribution. As 10

5 Relation-Name Transitive Reflexive anti-symmetric is-a superclass-of subclass-of instance-of TABLE I TAXONOMIC RELATIONS AND THEIR PROPERTIES depicted in Figure 3, the attack attribution links the following individuals: attacker, location, malicious, and attack. Fig. 3. Attack Attribution Relation The third N-ary relation in our ontology is the fulfill relation between an impact and a list of evidences. The fulfill relation uses the second type of N-ary relation design pattern. The fulfill relation links a single impact to one or more evidences fulfilled by that impact as depicted in Figure 4. Fig. 5. Attack Sequence Relation Fig. 4. Fulfill Relation The fourth and last N-ary relation in our ontology is the attack sequence relation, which is used to describe the attack scenario, expressed as an ordered list of attacks executed by the attacker. The attack sequence relation is described in Figure 5. V. ONTOLOGY REASONING Ontology in itself is only a sophisticated knowledge representation approach. This means that we still need a reasoning system or an inferenceengine that can make use of the knowledge encoded in the ontology. Reasoning over ontology is the process of finding implicit facts given explicitly stated facts in the ontology. Ontology reasoning is useful for generalization, prediction, diagnosis, and drawing conclusions from facts. In general there are three main forms of reasoning that can be implemented over ontologies. These forms of reasoning are deductive reasoning, inductive reasoning and abductive reasoning. Deductive reasoning is the most common reasoning model over ontologies. Deductive reasoning is used to draw a conclusion by narrowing down general domain knowledge encoded in the ontology. For instance, let us consider the following premises: P1: all probing attacks are Reconnaissance attacks and P2: IPsweep is a probing attack. Given the above premises, using deductive reasoning, we can conclude that: IPsweep is a reconnaissance attack. Inductive reasoning is a down-top reasoning approach that is based on observing instances, recognizing patterns and making generalizations based on those patterns. An important difference between inductive reasoning and deductive reasoning is that in inductive reasoning the truth of the premises does not guarantee the truth of the conclusion. For example, let us assume that we have n number of intrusions and all of these intrusions are instance-of Privilege Escalation attack. In addition, each of these instances Affects a FTP server and has the impact of root privileges. Given these facts and using inductive reasoning we can conclude that all privilege escalation attacks that target FTP servers will allow the intruder to gain root privileges. Abductive reasoning aims at finding the best explanation for an observed case or fact. Specifically, abduction reasoning allows the precondition a to be inferred from the consequence b. For instance, let us consider three intrusion instances A, B, and C, respectively, executed in sequence by the same intruder. Let us also assume that from the ontology we know that the 11

6 intrusion instance A is an FTP probing attack and that the intrusion instance C is based on an FTP exploit that requires the intruder to have root privileges. Given these facts we can infer that the intrusion instance B is a privilege escalation attack that has the impact of root privileges. As mentioned above, inductive reasoning and abductive reasoning over ontologies are less common compared to deductive reasoning. Likewise most of the available inference engines for ontologies focus on deductive reasoning. We found, however, that for some forensics tasks both abductive and inductive reasoning are very useful. For instance, during a forensics investigation we believe that abduction reasoning is very useful as a diagnosis approach to explain after the fact situation. In addition, inductive reasoning is useful in drawing good generalized conclusions from analyzing specific forensic cases. Our proposed ontology supports all three forms of reasoning as we illustrate in the case study presented in the next section. VI. CASE STUDY In this section we illustrate the use of our ontology in network forensics by presenting a real network intrusion case occurred in 2004 against a honeynet hosted in our lab. The honeynet was accessible over the Internet and deployed some hosts involving several well-known vulnerabilities. The attack we are using here as a case study is one of several attacks captured by our honeynet. It is a multistage attack conducted over three days where the intruder targeted a vulnerable FTP server installed in our honeynet to break into our network and take control of one of the machines. A. Case Study Overview As depicted in Figures 6 and 7, from host the intruder started by probing our network and then found a vulnerable FTP server with IP address He ran a buffer overflow exploit on the FTP server gaining root privileges on this host. Next, he used the compromised machine to execute a DOS attack against a machine with IP address external to our network. Fig. 6. Time-Analysis for a Multistage FTP Attack The network forensics data collected for the above intrusion case include the network binary file in pcap format, the snort alerts file, and the target system configuration data. The snort alerts file contains 90 alerts messages over six unique intrusion Fig. 7. Multistage FTP Attack Sequence signaturesthatoccurredduringaperiodof3hours.fourofthe six signatures are standard snort signatures with the following signature IDs: 553, 1622, 1672 and B. Attack Intelligence Extraction We illustrate in this subsection how an intelligent network forensics analysis system can use our proposed ontology and the reasoning mechanisms discussed earlier to reconstruct automatically the above attack scenario. Fig. 8. Ontological Representation for the Multistage FTP attack Figure 8 depicts the ontological representation of the multistage FTP attack. Using the instance and class inference capabilities, it can be inferred that the attack signatures 553 and 1622 are instance-of FTP probing and reconnaissance attack. Such information can be obtained via the instance-of relation between the attack instance and the FTPProbAttack class which is linked to Reconnaissance class via subclass- Of relation. The Reconnaissance class is a subclass of the Attack class. By applying the same approach for the remaining signatures, namely 1672 and 1378, it can be inferred that 1672 is a buffer overflow attack and that 1378 is a privilege escalation attack. As we can see, using the taxonomic relations instance- Of and subclass-of useful knowledge can be inferred about the attacks types. At this point we know that there are three main attack classes, namely, Reconnaissance, Exploitation and Privileges Escalation. Knowing the attacks types, knowledge about the privileges required to execute these attacks can now be inferred. For ex- 12

7 ample, the attack instance with signature 553 is an instance-of FTPProbAttack and the FTPProbAttack Requires anonymous FTP privileges. Therefore,(it can be concluded that) this attack instance requires anonymous FTP privileges. At this stage the ontology can also be used to infer the impact of the attack. For example, the attack instance with signature 1378 is an instance-of FTPD-Privileges attack class. The FTPD-Privileges attack class has the impact of root privileges. Therefore,(it can be concluded that) this attack instance has the impact of root privileges, and furthermore it can be inferred that the attacker behind this attack instance had gained root privileges. Using the N-ary relation attack sequence knowledge can be inferred about reconstructing the attack scenario. The attack sequence relation links the Reconnaissance, Exploitation and Privilege Escalation classes. It follows that the subclasses FTPProbAttack, FTPBufferOverflow and the FTPD- Priviliages form an attack sequence. Given this information it can be inferred that the attack instances with the signatures IDs 553, 1622, 1672 and 1378 are part of a multistage attack. C. Attack Attribution and Evidence Extraction In the previous section, we illustrate the use of deductive reasoning. In this section, we will illustrate inductive reasoning and deductive reasoning over attack attribution and evidence extraction cases, respectively. Weusetheterm attackattribution torefertotheprocessof attributing attack events by identifying their sources, methods, severity and underlying evidences. In our network forensics ontology, there are two N-ary relations that are useful for attributing network intrusions. These two N-ary relations are the attack attribution and the fulfill relations. Figure 9 depicts the representation of the attack attribution of the FTP privilege escalation attack within the ontology. According to our ontology the intrusion instance 1378 is an instance of FTPD Privilege Attack and attributed by the FTPD Privi Attribution class. The attribution provides information about the tools used in the attack, the origin of the attack and the individual behind the attack. In addition to the attack attribution relation, we have the Affects and the Requires relations that show the asset affected by the attack and the vulnerability exploited during the attack, respectively. Giventhe knowledgeencodedin the ontologyin Figures8and 9, using inductive reasoning we can conclude the following. Other versions of WU-FTPD server software contain software bug and may allow an attacker to execute arbitrary code. Networks running WU-FTPD server software have a severe vulnerability that can allow a remote intruder to gain root access. Although the above facts seem trivial for a human expert, reaching such conclusions is all but straightforward for a machine. As stated before abductive reasoning is very useful for inferring preconditions of specific consequences. The intrusion instances 553 and 1662 are proved-by the ServiceProb Alert Fig. 9. Ontological Representation for the FTP Prob Attack Attribution and the Service Exposed evidences as depicted in Figure 10. This can be inferred by deduction. But the interesting point here is the fulfill relation that shows that the evidences of the FTPProbAttack are fulfilled by the impact Ports Exposed. The impact Ports Exposed is the causes of a Port Scan Attack. Using this knowledge and abductive reasoning the framework can infer several explicit and interesting pieces of knowledge such as the following: The network was attacked by port scanning attack. The network is vulnerable to port scanning attack. The FTP server is exposed by port scanning attack. The NIDS generates false negative for port scanning attack. Fig. 10. Ontological Representation of the Impact Evidence Fullfill relation for the FTP Prob Attack VII. CONCLUSIONS In this paper we proposed a novel ontology-based network forensics knowledge representation approach. This ontology provides a formal description of the concepts characterizing the network forensics domain and describes the relationships between these concepts. In addition, the ontology is used to provide a formal description for network forensics analysis methods. Combining both network forensics domain knowledge and problem solving knowledge in a method ontology 13

8 will enable the development of network forensics systems than can perform complex reasoning which is essential when investigating malicious activities. The benefits of building and maintaining network forensics ontology to represent network forensics Knowledge are unquestionable. However, it takes a lot of time and effort to construct and maintain it. In addition, the huge number of concepts involved in the network forensics domain and their complex relations complicate the task of constructing and maintaining the ontology. Therefore, in our future work we will investigate the design of automated ontology construction methods. We will also investigate the design of application ontology which is a more specialized form of method ontology. In this case the ontology will represent knowledge for specific network forensics problem, such as botnets forensics, DDoS forensics or web-services attacks forensics. We believe that such approach can reduce the complexity of constructing and maintaining network forensics ontologies. REFERENCES [1] A. Brinson, A. Robinson, and M. Rogers, A cyber forensics ontology: Creating a new approach to studying cyber forensics, Digital Investigation, vol. 3, no. Supplement 1, pp , The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS 06). [2] H. Park, S. Cho, and H.-C. Kwon, Cyber forensics ontology for cyber criminal investigation, in e-forensics, pp , [3] A. Hoss and D. Carver, Weaving ontologies to support digital forensic analysis, in Intelligence and Security Informatics, ISI 09. IEEE International Conference on, pp , June [4] J. L. Undercoffer, A. Joshi, T. Finin, and J. Pinkston, A Target- Centric Ontology for Intrusion Detection, in The 18th International Joint Conference on Artificial Intelligence, July [5] S.-S. Hung and D. S.-M. Liu, An ontology-based network intrusion detection system: A user-oriented approach, in ISI, pp , [6] S.-S. Hung and D. Shing-Min Liu, A user-oriented ontology-based approach for network intrusion detection, Comput. Stand. Interfaces, vol. 30, no. 1-2, pp , [7] F. Abdoli and M. Kahani, Using attacks ontology in distributed intrusion detection system, in SCSS (1), pp , [8] M. L. Gustavo Isaza, Andrs Castillo and L. Castillo, Towards ontologybased intelligent model for intrusion detection and prevention, in Computational Intelligence in Security for Information Systems. [9] N. D. D. Gustavo Isaza, Andrs Castillo, An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies, in 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). [10] M. F. Lopez, A. G. Perez, and N. Juristo, Methontology: from ontological art towards ontological engineering, in Proceedings of the AAAI97 Spring Symposium, (Stanford, USA), pp , March [11] M. Uschold and M. Grüninger, Ontologies: principles, methods, and applications, Knowledge Engineering Review, vol. 11, no. 2, pp , [12] M. Grüninger and M. S. Fox, Methodology for the design and evaluation of ontologies, in Proceedings of Workshop on Basic Ontological Issues in Knowledge Sharing held in conjunction with IJCAI-95, [13] C. E. Landwehr, A. R. Bull, J. P. Mcdermott, and W. S. Choi, A taxonomy of computer program security flaws, with examples, ACM Comput. Surv., vol. 26, pp , September [14] S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, vol. 24, no. 1, pp , [15] A. S. Peter, P. S, and L. V. Ekert, An ontology for network security attacks, in In Proceedings of the 2nd Asian Applied Computing Conference (AACC04), LNCS 3285, pp , Springer-Verlag,

Extracting Attack Scenarios Using Intrusion Semantics

Extracting Attack Scenarios Using Intrusion Semantics Extracting Attack Scenarios Using Intrusion Semantics Sherif Saad and Issa Traore University of Victoria, BC, Canada shsaad@ece.uvic.ca, itraore@engr.uvic.ca Abstract. Building the attack scenario is the

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT

THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT The Use of Ontologies in Forensic Analysis... JDFSL V10N4 THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT Mohammed Alzaabi 1, Thomas Anthony Martin 1, Kamal Taha 1, and Andy Jones 2 1

More information

Domain-specific Concept-based Information Retrieval System

Domain-specific Concept-based Information Retrieval System Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical

More information

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management *

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management * A Rule-Based Intrusion Correlation System for Integrated Security Management * Seong-Ho Lee 1, Hyung-Hyo Lee 2, and Bong-Nam Noh 1 1 Department of Computer Science, Chonnam National University, Gwangju,

More information

Vulnerabilities. To know your Enemy, you must become your Enemy. Information security: Vulnerabilities & attacks threats. difficult.

Vulnerabilities. To know your Enemy, you must become your Enemy. Information security: Vulnerabilities & attacks threats. difficult. Vulnerabilities To know your Enemy, you must become your Enemy. "The Art of War", Sun Tzu André Zúquete Security 1 Information security: Vulnerabilities & attacks threats Discouragement measures difficult

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

An Ontology-Based Model for SIEM Environments

An Ontology-Based Model for SIEM Environments An Ontology-Based Model for SIEM Environments Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, and Herve Debar Telecom Sudparis, SAMOVAR UMR 5157 9 rue Charles Fourier, 91011 EVRY, France

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary Takeaways You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection S. Revathi Ph.D. Research Scholar PG and Research, Department of Computer Science Government Arts

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES Zakiya Malek, Dr. Bhushan Trivedi GLS Institute of Technology Abstract-In the era of information systems and internet there is more

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Ontology Development. Qing He

Ontology Development. Qing He A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Ontology Development Qing He 1 Why develop an ontology? In recent years the development of ontologies

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Intrusion Detection System using AI and Machine Learning Algorithm

Intrusion Detection System using AI and Machine Learning Algorithm Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

A fault tolerance honeypots network for securing E-government

A fault tolerance honeypots network for securing E-government A fault tolerance honeypots network for securing E-government Shahriar Mohammadi Bahman Nikkhahan smohammadi40@yahoo.com Nikkhahan@sina.kntu.ac.ir Information Technology Engineering Group, Department of

More information

Ontology Creation and Development Model

Ontology Creation and Development Model Ontology Creation and Development Model Pallavi Grover, Sonal Chawla Research Scholar, Department of Computer Science & Applications, Panjab University, Chandigarh, India Associate. Professor, Department

More information

Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN

Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN Amandeep Singh, Pankush Singla, Navdeep Kaur Khiva 101 Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN Amandeep Singh Pankush Sukhpreet Singla Singh Navdeep Kaur Khiva Second

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE TABLE OF CONTENTS Overview...3 A Multi-Layer Approach to Endpoint Security...4 Known Attack Detection...5 Machine Learning...6 Behavioral Analysis...7 Exploit

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved.

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved. IDS & IPD CSH6 Chapter 27 Intrusion Detection & Intrusion Prevention Devices Rebecca Gurley Bace Topics Security Behind the Firewall Main Concepts Intrusion Prevention Information Sources Analysis Schemes

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 6 Intrusion Detection First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Intruders significant issue hostile/unwanted

More information

CIRT: Requirements and implementation

CIRT: Requirements and implementation CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Active defence through deceptive IPS

Active defence through deceptive IPS Active defence through deceptive IPS Authors Apostolis Machas, MSc (Royal Holloway, 2016) Peter Komisarczuk, ISG, Royal Holloway Abstract Modern security mechanisms such as Unified Threat Management (UTM),

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

A Semantic Architecture for Industry 4.0

A Semantic Architecture for Industry 4.0 A Semantic Architecture for Industry 4.0 Cecilia Zanni Merk cecilia.zanni merk @ unistra.fr Deputy Head of the SDC team of ICube 4P Factory e lab March 16 th, 2016 Agenda Introduction Basic principles

More information

KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT

KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT KNOWLEDGE MANAGEMENT VIA DEVELOPMENT IN ACCOUNTING: THE CASE OF THE PROFIT AND LOSS ACCOUNT Tung-Hsiang Chou National Chengchi University, Taiwan John A. Vassar Louisiana State University in Shreveport

More information

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In?

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In? Detection Vulnerability Assessment Week 4 Part 2 How Much Danger Am I In? Vulnerability Assessment Aspects of Assessment Vulnerability Assessment is a systematic evaluation of asset exposure to threats

More information

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence , pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures Atif Ahmad Department of Information Systems, University of Melbourne, Parkville, VIC

More information

Annotation for the Semantic Web During Website Development

Annotation for the Semantic Web During Website Development Annotation for the Semantic Web During Website Development Peter Plessers and Olga De Troyer Vrije Universiteit Brussel, Department of Computer Science, WISE, Pleinlaan 2, 1050 Brussel, Belgium {Peter.Plessers,

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

X-ARF: A Reporting and Exchange Format for the Data Exchange of Netflow and Honeypot Data

X-ARF: A Reporting and Exchange Format for the Data Exchange of Netflow and Honeypot Data X-ARF: A Reporting and Exchange Format for the Data Exchange of Netflow and Honeypot Data Jan Kohlrausch, Sven Übelacker, GÉANT 3 JRA2 T4: Internal deliverable DFN-CERT Services GmbH Hamburg, Germany Email:

More information

Standard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1.

Standard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1. Standard Categories for Incident Response Teams Definitions V2.1 February 2018 Standard Categories for Incident Response (definitions) V2.1 1 Introduction This document outlines categories that Incident

More information

Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems

Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems Vol. 5, 108 Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems 1 Ameya Gangamwar, 2 Anand Kanani, 3 Vivek Singh, 4 Rachana Srivastav and 5 Deven Shah Abstract- The proposed system using

More information

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions IPS Effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defense that helps you protect

More information

Relating Software Coupling Attribute and Security Vulnerability Attribute

Relating Software Coupling Attribute and Security Vulnerability Attribute Relating Software Coupling Attribute and Security Vulnerability Attribute Varadachari S. Ayanam, Frank Tsui, Sheryl Duggins, Andy Wang Southern Polytechnic State University Marietta, Georgia 30060 Abstract:

More information

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Ja-Min Koo and Sung-Bae Cho Dept. of Computer Science, Yonsei University, Shinchon-dong, Seodaemoon-ku,

More information

Online Intrusion Alert Based on Aggregation and Correlation

Online Intrusion Alert Based on Aggregation and Correlation Online Intrusion Alert Based on Aggregation and Correlation Kunchakarra Anusha 1, K.V.D.Sagar 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur.,

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Grid-CERT Services. Modification of traditional and additional new CERT Services for Grids

Grid-CERT Services. Modification of traditional and additional new CERT Services for Grids Grid-CERT Services Modification of traditional and additional new CERT Services for Grids Presentation at the Annual FIRST Conference Vancouver, Canada June 26, 2008 Antonio Liu 2000-2008 by PRESECURE

More information

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Dhirubhai Ambani Institute for Information and Communication Technology, Gandhinagar, Gujarat, India Email:

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

Methodologies, Tools and Languages. Where is the Meeting Point?

Methodologies, Tools and Languages. Where is the Meeting Point? Methodologies, Tools and Languages. Where is the Meeting Point? Asunción Gómez-Pérez Mariano Fernández-López Oscar Corcho Artificial Intelligence Laboratory Technical University of Madrid (UPM) Spain Index

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Honeypots. Security on Offense. by Kareem Sumner

Honeypots. Security on Offense. by Kareem Sumner Honeypots Security on Offense by Kareem Sumner Agenda Introduction What Are Honeypots? Objectives Successful Deployment Advantages And Disadvantages Types Of Honeypots Honeypot Software Future of Honeypots/Honeynets

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

2 Which Methodology for Building Ontologies? 2.1 A Work Still in Progress Many approaches (for a complete survey, the reader can refer to the OntoWeb

2 Which Methodology for Building Ontologies? 2.1 A Work Still in Progress Many approaches (for a complete survey, the reader can refer to the OntoWeb Semantic Commitment for Designing Ontologies: A Proposal Bruno Bachimont 1,Antoine Isaac 1;2, Raphaël Troncy 1;3 1 Institut National de l'audiovisuel, Direction de la Recherche 4, Av. de l'europe - 94366

More information

WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION. A Novetta Cyber Analytics Brief

WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION. A Novetta Cyber Analytics Brief WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION A Novetta Cyber Analytics Brief Why SIEMs with advanced network-traffic analytics is a powerful combination. INTRODUCTION Novetta

More information

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY WORLD JOURNAL OF PHARMACY AND PHARMACEUTICAL SCIENCES Shoba. SJIF Impact Factor 6.647 Volume 6, Issue 5, 304-308 Review Article ISSN 2278 4357 AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY *Prof. V.

More information

SSL Automated Signatures

SSL Automated Signatures SSL Automated Signatures WilliamWilsonandJugalKalita DepartmentofComputerScience UniversityofColorado ColoradoSprings,CO80920USA wjwilson057@gmail.com and kalita@eas.uccs.edu Abstract In the last few years

More information

Probabilistic Attack Planning in Network + WebApps Scenarios

Probabilistic Attack Planning in Network + WebApps Scenarios Probabilistic Attack Planning in Network + WebApps Scenarios Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA H2HC Nov 28/29, 2009 Brief presentation My company:

More information

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering The Pennsylvania State University The Graduate School Department of Computer Science and Engineering CONTEXT-DRIVEN SIMILARITY-BASED RETRIEVAL OF CYBER ANALYST EXPERIENCES FOR MULTI-STEP ATTACK ANALYSIS

More information

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards. or Detection Comp Sci 3600 Security Outline or 1 2 3 4 5 or 6 7 8 Classes of or Individuals or members of an organized crime group with a goal of financial reward Their activities may include: Identity

More information

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

OWLS-SLR An OWL-S Service Profile Matchmaker

OWLS-SLR An OWL-S Service Profile Matchmaker OWLS-SLR An OWL-S Service Profile Matchmaker Quick Use Guide (v0.1) Intelligent Systems and Knowledge Processing Group Aristotle University of Thessaloniki, Greece Author: Georgios Meditskos, PhD Student

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

Resolving Security s Biggest Productivity Killer

Resolving Security s Biggest Productivity Killer cybereason Resolving Security s Biggest Productivity Killer How Automated Detection Reduces Alert Fatigue and Cuts Response Time 2016 Cybereason. All rights reserved. 1 In today s security environment,

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Professor, SIS Lecture 12 2016 Intrusion Detection, Auditing System Firewalls & VPN 1 Intrusion Detection 2 Intrusion Detection/Response Denning:

More information

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

Demystifying Service Discovery: Implementing an Internet-Wide Scanner Demystifying Service Discovery: Implementing an Internet-Wide Scanner Derek Leonard Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University,

More information

Intrusion Detection Systems Overview

Intrusion Detection Systems Overview Intrusion Detection Systems Overview Chris Figueroa East Carolina University figueroac13@ecu.edu Abstract Modern intrusion detection systems provide a first line of defense against attackers for organizations.

More information

Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack

Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack Faeiz M. Alserhani College of Computer & Information Sciences, Dep. of Computer Engineering

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected

More information

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING Moch. Zen Samsono Hadi, Entin M. K., Aries Pratiarso, Ellysabeth J. C. Telecommunication Department Electronic Engineering Polytechnic

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

Tool-Supported Cyber-Risk Assessment

Tool-Supported Cyber-Risk Assessment Tool-Supported Cyber-Risk Assessment Security Assessment for Systems, Services and Infrastructures (SASSI'15) Bjørnar Solhaug (SINTEF ICT) Berlin, September 15, 2015 1 Me Bjørnar Solhaug Bjornar.Solhaug@sintef.no

More information

ISC2 EXAM - SSCP. Systems Security Certified Practitioner. Buy Full Product.

ISC2 EXAM - SSCP. Systems Security Certified Practitioner. Buy Full Product. ISC2 EXAM - SSCP Systems Security Certified Practitioner Buy Full Product http://www.examskey.com/sscp.html Examskey ISC2 SSCP exam demo product is here for you to test the quality of the product. This

More information

Authentication System

Authentication System A Biologically Inspired Password Authentication System Dipankar Dasgupta and Sudip Saha Center for Information Assurance University of Memphis Memphis, TN 38152 Outline Motivation Position Authentication

More information

Investigative Response Modeling and Predictive Data Collection

Investigative Response Modeling and Predictive Data Collection Investigative Response Modeling and Predictive Data Collection Dan Moor HP dan.moor@hp.com S. Raj Rajagopalan Honeywell ACS siva.rajagopalan@honeywell.com Sathya Chandran Sundaramurthy, Xinming Ou Kansas

More information

SANS Institute , Author retains full rights.

SANS Institute , Author retains full rights. Steven F Burns GIAC Security Essentials Certification (GSEC) Practical Assignment Version 1.4c Threat Modeling: A Process To Ensure Application Security January 5, 2005 Abstract This paper discusses the

More information

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. 1 ISC - SSCP System Security Certified Practitioner (SSCP) Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. Question: 2 What is the main difference between computer

More information

Framework for Next Generation Digital Forensics Models

Framework for Next Generation Digital Forensics Models Framework for Next Generation Digital Forensics Models Mohsen M. Doroodchi 1, Amjad Ali 1 1 Center for Security Studies, University of Maryland University College, Adelphi, Maryland, USA Abstract - Digital

More information